Skip to main content

IMPULSE CAPTURE CAMERA Overview Part-1

 

Why people are talking so much about IoT? Is IoT really future? | by  Thinkwik | Medium

Objective

The Android camera platform designed in this project can turn its direction Manually using Button. If a person claps hands,then it will Detect and Impulse and capture the Moment this Device will capture multiple photos if more than one claps detected. It will not only detect clap sound it can detect any kind of noise and starts capturing the photos. The system which we have detected can distinguish between noise and impulse sound. 
 

Motivation

  • When we travel alone, it can be inconvenient to take pictures with yourself in it. Often, we have to hold the camera with our hands and capture a close photo with barely background. In a better case, we still need to pre-set a short timer, which requires us rushes back from the camera. Therefore, we came up with platform that uses microphones to detect clap direction and ATmega32microcontroller with servo motor to control the camera and earpod to shutter. This design makes selfie much more easier and convenient since all you need is to choose your favoritescene and clap the hands. It will also help friends or family in which case no one should be left out of the group photos. 
  • It is more useful in Security Aspect in ATM machine in which if some surrounding sound are detected then it will capture photo and its easy to find what is happening nearby thus this will save memory. 

 Project Estimation 

  • ATMega32 - CA$11/-
  • Headphone - CA$5/-
  • Sound Sensor - CA$11/-
  • Servo Motor - CA$8.95/-
  • Breadboard/Registers/switch Kit- CA$10/- 
  • Boot-loader - CA$12/- 

Similar Project 

 
 Note: Design and Implementation Part-2
 

Comments

  1. Thanks for suggesting good list. I appreciate your work this is really helpful for everyone. Get more information at Atm Machine For Business. Keep posting such useful information.

    ReplyDelete
  2. You are offering such a large resource, and you do so without charge.I adore reading blogs that recognise the value in offering good resources for no cost. custom erp software

    ReplyDelete

Post a Comment

Thanks

Popular posts from this blog

Emotional and Psychological Trauma

What is Emotional and psychological trauma ? Emotional and psychological trauma is any stressful event that occurs in a lifetime that makes you struggle with your emotions, memory,different activities and make you feel helpless and hopeless in this ruthless world. The event may not be objectively scaled it is a subjective sensation about a event and every individual respond differently to the event . For example a death in a family due to accident due to an pothole makes one dad react positively and he goes on to correct every pothole of the city and some other may react it negatively Emotional and psychological trauma can be caused by: In Indian scenarios emotional and psychological trauma can be caused by accident,disasters, sexual assault that may have occurred at any course of life Ongoing family issues, neighbourhood problems , continues rejection from various interviews , household violence , neglect, low performance at school or institution, contin

Office of the Personnel Management (OPM) Data Breach: A Case Study

WHAT HAPPENED IN THE OPM DATA BREACH      As the relationship between humanity and technology develops, an emergent area of concern lies in the security of the information ferried over and handled by this technology. A myriad of information security and data breaches reported upon by news media in the recent past has had the simultaneously fortunate and unfortunate effect of bringing information and network security into the public consciousness. One such incident was the United States (US) Office of the Personnel Management (OPM) data breach.      While there are many aspects of the OPM data breach that are notable, chief among them is that the perpetrator of this data breach has been widely attributed to China. As China increases its economic clout and develops its technological capabilities, its international presence is becoming more and more pronounced—and not always in the best light. Sanger (2018) has noted that by 2009, Google executives had noticed state-sponsored

Are You Prepared Against Cyber Threats?

What is the worth of information Security in 21 st century? Imagine small or medium scale business having around 2500-4000 employees working. What if there is a data bridge of small or medium scale compony? Information carries by Venture are employees’ names, Address, Banking Forms, Tax forms which also includes Social incurrence Number and their dependents names and supporting information which may be sell or used for personal blackmails by intruders which was kind of storyline of Scotty’s Holdings data bridge [1] . Main base of this data bridge was email phishing which were send to all over compony employee pretending to be CEO. Which contains Employer identification number (EIN), Employer’s name, address, and ZIP code, Wages, tips, other compensation and many more fields. But it’s not the first or last compony to be a part of Email phishing Attack. Main purpose of Email Phishing scams is stealing banking credentials or any other form of credentials. Preventions Employer and Emp